Mostrando 3 resultados de: 3
Subtipo de publicación
Conference Object(3)
Publisher
Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012(1)
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016(1)
Proceedings - 2020 46th Latin American Computing Conference, CLEI 2020(1)
Área temáticas
Ciencias de la computación(1)
Consideraciones generales de la administración pública(1)
Derecho laboral, social, educativo y cultural(1)
Dirección general(1)
Ingeniería y operaciones afines(1)
Bring your own disclosure: Analysing BYOD threats to corporate information
Conference ObjectAbstract: Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisatPalabras claves:Attack, BYOD, contamination, Disclosure, Forensics, Insider, Outsider, STRIDE, Threat modelAutores:Denys A. Flores, Jhumka A., Qazi F.Fuentes:googlescopusCloud-GMR: A Qualitative Framework for Governance and Risk Management of Cloud-hosted Public Services
Conference ObjectAbstract: The rapid adoption of Cloud Computing in the last decade has promoted the development and innovationPalabras claves:CLOUD COMPUTING, cobit, Governance, iso 27005, octave, Public Sector, Risk managementAutores:Denys A. Flores, Morocho G.Fuentes:googlescopusCONDOR: A hybrid IDS to offer improved intrusion detection
Conference ObjectAbstract: Intrusion Detection Systems are an accepted and very useful option to monitor, and detect maliciousPalabras claves:Anomaly, false negative, false positive, hybrid, Ids, intrusion detection, NIDS, SignatureAutores:Day D.J., Denys A. Flores, Lallie H.S.Fuentes:googlescopus